Journal: IET Networks

Volume 7, Issue 6

363 -- 367Chandrashekhar Meshram, Pournima L. Powar, Mohammad S. Obaidat, Cheng-Chi Lee, Sarita Gajbhiye Meshram. Efficient online/offline IBSS protocol using partial discrete logarithm for WSNs
368 -- 375Shuo-Yen Robert Li. Unified theory on preservation of conditionally non-blocking switches by the two-stage interconnection network
376 -- 383Saad M. Darwish, Adel El-Zoghabi, Amr G. El-Shnawy. Proactive cache replacement technique for mobile networks based on genetic programming
384 -- 392Guillaume Ferré, Eric Pierre Simon. Packet collision analysis when heterogeneous unlicensed IoT technologies coexist
393 -- 397Waleed Saad, Somaya A. El-Feshawy, Mona Shokair, Mouad I. Dessouky. Optimised approach based on hybrid MAC protocol for M2M networks
398 -- 405Ahmed Abdelaziz Salem, Sayed El-Rabaie, Mona Shokair. Energy efficient ultra-dense networks based on multi-objective optimisation framework
406 -- 413Deepak Kumar Patel, Chita Ranjan Tripathy. On the design of an efficient load balancing mechanism on GridSim adapted to the computing environment of heterogeneity in both resources and networks
414 -- 421Zahra Zarei, Mozafar Bag Mohammadi. Priority-based target coverage in directional sensor networks
422 -- 428Hassan El Alami, Abdellah Najid. i : routing technique to minimise energy consumption and packet loss in WSNs with mobile sink
429 -- 434Neminath Hubballi, Jonathan Santini. Detecting TCP ACK storm attack: a state transition modelling approach
435 -- 444Ayan Paul, Devodyuti Mukherjee, Madhubanti Maitra. Reinforcement learning-based negotiation for spectrum micro-trading framework
445 -- 452Arunmozhi Manimuthu, Ramadoss Ramesh. Privacy and data security for grid-connected home area network using Internet of Things
453 -- 459Majd Latah, Levent Toker. Towards an efficient anomaly-based intrusion detection for software-defined networks
460 -- 464Babedi. B. Letswamotse, Reza Malekian, Chi-Yuan Chen, Kgotlaetsile Mathews Modieginyane. Software defined wireless sensor networks and efficient congestion control
465 -- 470Zhengxiong Dou, Xiaonan Wang, Yanli Li. Data acquisition based on vehicular cloud

Volume 7, Issue 5

281 -- 282. Guest Editorial: Privacy, Data Assurance, Security Solutions for Internet of Things (PASS4IoT)
283 -- 286Jiajia Song, Jinbo Zhang, Xinnan Fan. ad-hoc network
287 -- 293Manjula Raja, Raja Datta. Efficient aggregation technique for data privacy in wireless sensor networks
294 -- 298Mohamed Boussif, Noureddine Aloui, Adnene Cherif. Secured cloud computing for medical data based on watermarking and encryption
299 -- 305Tao Qin, Yuli Gao, Lingyan Wei, Zhaoli Liu, Chenxu Wang. Potential threats mining methods based on correlation analysis of multi-type logs
306 -- 312Ainaz Bahramlou, Reza Javidan. Adaptive timing model for improving routing and data aggregation in Internet of things networks using RPL
313 -- 320Rajavel Dhandabani, Shantharajah S. Periyasamy, Theagarajan Padma, Arun Kumar Sangaiah. Six-face cubical key encryption and decryption based on product cipher using hybridisation and Rubik's cubes
321 -- 327Philip O'Kane, Sakir Sezer, Domhnall Carlin. Evolution of ransomware
328 -- 335Thomas I. Tegou, Antonios Tsiflikiotis, Dimitrios D. Vergados, Katherine Siakavara, Spiros Nikolaidis, Sotirios K. Goudos, Panagiotis G. Sarigiannidis, Mohammad S. Obaidat. Spectrum allocation in cognitive radio networks using chaotic biogeography-based optimisation
336 -- 345Mahsa Derakhshani, Saeedeh Parsaeefard, Tho Le-Ngoc, Alberto Leon-Garcia. Leveraging synergy of SDWN and multi-layer resource management for 5G networks
346 -- 352Mohammad Al-Hisnawi, Mahmood Ahmadi. QCF for deep packet inspection
353 -- 361Habib Mostafaei, Mohammad S. Obaidat. Learning automaton-based self-protection algorithm for wireless sensor networks

Volume 7, Issue 4

163 -- 164. Guest Editorial: Traffic Engineering and Optimisation in Next Generation Networks
165 -- 172Tawfik Ismail, Erich Leitgeb, Zabih Ghassemlooy, Mohammed Alnahhal. Performance improvement of FSO system using multi-pulse pulse position modulation and SIMO under atmospheric turbulence conditions and with pointing errors
173 -- 180Thomas Lagkas, Panagiotis G. Sarigiannidis, Paolo Bellavista, Carlo Giannelli. Multi-stage resource allocation in hybrid 25G-EPON and LTE-Advanced Pro FiWi networks for 5G systems
181 -- 189Chetna Singhal, Swades De. eM-SON: efficient multimedia service over self-organising Wi-Fi network
190 -- 199Joy Eze, Sijing Zhang, Enjie Liu, Elias Chinedum Eze. Cognitive radio-enabled Internet of Vehicles: a cooperative spectrum sensing and allocation for vehicular communication
200 -- 209Elias Chinedum Eze, Sijing Zhang, Enjie Liu, Joy Eze, Shehu Jabaka Muhammad. Reliable and enhanced cooperative cross-layer medium access control scheme for vehicular communication
210 -- 219Fatma Salem, Yassin Elhillali, Smaïl Niar. Efficient modelling of IEEE 802.11p MAC output process for V2X interworking enhancement
220 -- 225Sajjad Alizadeh, Reza Saadat. Performance improvement of pilot-assisted power allocation in vehicular small cells with preprocessing under measurement errors
226 -- 232Ali El Ksimi, Leghris Cherkaoui. Minimising the impact of IPv6 neighbour discovery messages on energy consumption in small objects networks
233 -- 241Stefanos G. Sagkriotis, Spyros K. Pantelis, Ioannis D. Moscholios, Vassilios G. Vassilakis. Call blocking probabilities in a two-link multirate loss system for Poisson traffic
242 -- 247Ioannis D. Moscholios, Vassilios G. Vassilakis, Panagiotis G. Sarigiannidis. Performance modelling of a multirate loss system with batched Poisson arrivals under a probabilistic threshold policy
248 -- 257Waqar Khurshid, Miss Laiha Mat Kiah, Imran Ali Khan, Rosli Salleh, Anthony Theodore Chronopoulos, Sajjad Ahmed Madani. Comparative study of congestion notification techniques for hop-by-hop-based flow control in data centre Ethernet
258 -- 264Suresh Kallam, Rajasekhara Babu Madda, Chi-Yuan Chen, Rizwan Patan, Dhanaraj Cheelu. Low energy aware communication process in IoT using the green computing approach
265 -- 272Yuvaraj Padmanaban, Manimozhi Muthukumarasamy. Energy-efficient clustering algorithm for structured wireless sensor networks
273 -- 279Mayank Swarnkar, Neminath Hubballi. RDClass: on using relative distance of keywords for accurate network traffic classification
280 -- 0. Erratum: Delay-aware data collecting protocol for low-duty-cycle wireless sensor networks

Volume 7, Issue 3

91 -- 94Atiieh Hoseinpour, Mojtaba Jafari Lahijani, Mohammad Hoseinpour, Javad Kazemitabar. Fitness function improvement of evolutionary algorithms used in sensor network optimisations
95 -- 102Vahid Kouhdaragh, Iraj Sadegh Amiri, Seyedalireza Seyedi. Smart grid load balancing methods to make an efficient heterogeneous network by using the communication cost function
103 -- 108Vassilios G. Vassilakis, Ioannis D. Moscholios, Michael D. Logothetis. Efficient radio resource allocation in SDN/NFV based mobile cellular networks under the complete sharing policy
109 -- 118Jun Zhan, Yong Liu, Xiaohu Tang, Qingchun Chen. Relaying protocols for buffer-aided energy harvesting wireless cooperative networks
119 -- 128Nouri Omheni, Imen El Bouabidi, Amina Gharsallah, Faouzi Zarai, Mohammad S. Obaidat. Smart mobility management in 5G heterogeneous networks
129 -- 135Yilin Wang, Donghui Li, Na Dong. Cellular automata malware propagation model for WSN based on multi-player evolutionary game
136 -- 140Kai Wang, Yude Zhao, Shugang Liu, Xiangrong Tong. On the urgency of implementing Interest NACK into CCN: from the perspective of countering advanced interest flooding attacks
141 -- 151Vijayalakshmi Murugesan, Mercy Shalinie, Ming-Hour Yang. Design and analysis of hybrid single packet IP traceback scheme
152 -- 161Dharani Kumari Nooji Venkatramana, Shylaja Banagiri Srikantaiah, Jayalakshmi Moodabidri. CISRP: connectivity-aware intersection-based shortest path routing protocol for VANETs in urban environments

Volume 7, Issue 2

51 -- 52. Guest Editorial: Security Architecture and Technologies for 5G
53 -- 60Jiaqi Li, Zhifeng Zhao, Rongpeng Li. Machine learning-based IDS for software-defined 5G network
61 -- 67Jiaxin Zeng, Yuanlong Cao, Fenfen Ke, Minghe Huang, Guanghe Zhang, Wei Lu. Performance evaluation of secure multipath retransmission mechanism in next generation heterogeneous communication systems
68 -- 73Ping Xie, Moli Zhang, Gaoyuan Zhang, Ruijuan Zheng, Ling Xing, Qingtao Wu. On physical-layer security for primary system in underlay cognitive radio networks
74 -- 84Vu Viet Hoang Pham, Shui Yu, Keshav Sood, Lei Cui. Privacy issues in social networks and analysis: a comprehensive survey
85 -- 90Juan Du, Ping Xie, Junlong Zhu, Ruijuan Zheng, Qingtao Wu, Mingchuan Zhang. Method for detecting abnormal behaviour of users based on selective clustering ensemble

Volume 7, Issue 1

1 -- 13Badis Hammi, Rida Khatoun, Sherali Zeadally, Achraf Fayad, Lyes Khoukhi. IoT technologies for smart cities
14 -- 22Othmane Nait Hamoud, Tayeb Kenaza, Yacine Challal. Security in device-to-device communications: a survey
23 -- 32Pedro David Arjona-Villicaña, Costas C. Constantinou, Alexander S. Stepanenko, Jesús Acosta-Elías. Analysis of the use of complete orders to abstract the internet connectivity at the autonomous system level
33 -- 43Abd Elwahab Fawzy, Mona Shokair, Waleed Saad. Balanced and energy-efficient multi-hop techniques for routing in wireless sensor networks
44 -- 49Hua He, Zhen Xu, Lei Yang. Delay-aware data collecting protocol for low-duty-cycle wireless sensor networks